A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.
[1]
Hans Eriksson,et al.
Business Modeling With UML: Business Patterns at Work
,
2000
.
[2]
Vijayalakshmi Atluri,et al.
An Authorization Model for Workflows
,
1996,
ESORICS.
[3]
Joon S. Park,et al.
Access control mechanisms for inter-organizational workflow
,
2001,
SACMAT '01.
[4]
Ravi S. Sandhu,et al.
Role-Based Access Control Models
,
1996,
Computer.
[5]
D. Hollingsworth.
The workflow Reference Model
,
1994
.
[6]
Shengli Wu,et al.
Authorization and Access Control of Application Data in Workflow Systems
,
2004,
Journal of Intelligent Information Systems.
[7]
Jan H. P. Eloff,et al.
Designing role hierarchies for access control in workflow systems
,
2001,
25th Annual International Computer Software and Applications Conference. COMPSAC 2001.